Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Flaws in Some Robust Optimistic Mix-Nets

  • Conference paper
  • First Online:

Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 2727))

Included in the following conference series:

  • 4699Accesses

Abstract

This paper introduces weaknesses of two robust Mix-nets proposed in [10] and [7]. First, we show that [10] can lose anonymity inthe presence of a malicious user even though all servers are honest. Second, we show that [7] can lose anonymity through the collaboration of a malicious user and the first server. The user can identify the plaintextsent from the targeted user by invoking two mix sessions at the risk of the colluding server receiving an accusation. We also point out that in acertain case, anonymity is violated solely by the user without colluding to any server. Practical repairs are provided for both schemes. Since such flaws are due to their weak security definitions, we present a stronger security definition by regarding a Mix-net as a batch decryption algorithm of a CCA secure public-key encryption scheme.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abe.Efficient Components for Cryptographic Applications in the Discrete-Log Setting. PhD thesis, University of Tokyo, 2002.

    Google Scholar 

  2. M. Abe and F. Hoshino. Remarks on mix-network based on permutation network. In K. Kim, editor,PKC 2001, volume 1992 ofLecture Notes in Computer Science, pages 317–324. Springer-Verlag, 2001.

    Google Scholar 

  3. R. Canetti. Security and composition of multiparty cryptographic protocols.Journal of Cryptology, 13(1):143–202, Winter 2000.

    Article MATH MathSciNet  Google Scholar 

  4. D. L. Chaum. Untraceable electronic mail, return address, and digital pseudonyms.Communications of the ACM, 24:84–88, 1981.

    Article  Google Scholar 

  5. Y. Desmedt and K. Kurosawa. How to break a practical MIX and design a new one. In Bart Preneel, editor,Advances in Cryptology — EUROCRYPT 2000, volume 1807 ofLecture Notes in Computer Science, pages 557–572. Springer-Verlag, 2000.

    Chapter  Google Scholar 

  6. J. Furukawa and K. Sako. An efficient scheme for proving a shuffle. In J. Killian, editor,Advances in Cryptology — Crypto 2001, volume 2139 ofLecture Notes in Computer Science, pages 368–387. Springer-Verlag, 2001.

    Google Scholar 

  7. P. Golle, S. Zhong, D. Boneh, M. Jakobsson, and A. Juels. Optimistic mixing for exit-polls. In Y. Zheng, editor,Advances in Cryptology — Asiacrypt 2002, volume 2501 ofLecture Notes in Computer Science, pages 451–465. Springer-Verlag, 2002.

    Chapter  Google Scholar 

  8. H. Handschuh, Y. Tsiounis, and M. Yung. Decision oracles are equivalent to matching oracles. In H. Imai and Y. Zheng, editors,Second International Workshop on Practice and Theory in Public Key Cryptography, volume 1560 ofLecture Notes in Computer Science, pages 276–289. Springer-Verlag, 1999.

    Google Scholar 

  9. M. Jakobsson. A practical mix. In K. Nyberg, editor,Advances in Cryptology — EUROCRYPT’ 98, volume 1403 ofLecture Notes in Computer Science, pages 448–461. Springer-Verlag, 1998.

    Chapter  Google Scholar 

  10. A. Juels and M. Jakobsson. An optimally robust hybrid mix network. InProceedings of the 20thannual ACM Symposium on Principles of Distributed Computation, 2001.

    Google Scholar 

  11. A. Neff. A verifiable secret shuffle and its application to e-voting. InACM CCS’01, pages 116–125. ACM, 2001.

    Google Scholar 

  12. M. Ohkubo and M. Abe. A length-invariant hybrid mix. In T. Okamoto, editor,Advances in Cryptology — ASIACRYPT 2000, volume 1976 ofLecture Notes in Computer Science, pages 178–191. Springer-Verlag, 2000.

    Chapter  Google Scholar 

  13. B. Pfitzmann. Breaking an efficient anonymous channel. In Alfredo De Santis, editor,Advances in Cryptology — EUROCRYPT’ 94, volume 950 ofLecture Notes in Computer Science, pages 339–348. Springer-Verlag, 1995.

    Chapter  Google Scholar 

  14. K. Sako and J. Killian. Receipt-free mix-type voting scheme — a practical solution to the implementation of a voting booth —. In L. C. Guillou and J.-J. Quisquater, editors,Advances in Cryptology — EUROCRYPT’ 95, volume 921 ofLecture Notes in Computer Science, pages 393–403. Springer-Verlag, 1995.

    Google Scholar 

  15. C. P. Schnorr and M. Jakobsson. Security of signed Elgamal encryption. In T. Okamoto, editor,Advances in Cryptology — ASIACRYPT 2000, volume 1976 ofLecture Notes in Computer Science, pages 73–89. Springer-Verlag, 2000.

    Chapter  Google Scholar 

  16. D. Wikström. Four practical attacks for “optimistic mixing for exit-polls”. Technical Report SICS-T-2003/04-SE, Swedish Institute of Computer Science (SICS), February 2003. (Preliminary SICS-T-2002/24-SE, Dec. 2002).

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. NTT Laboratories, Japan

    Masayuki Abe

  2. Information & Systems, Institute of Industrial Science, University of Tokyo, Tokyo

    Hideki Imai

Authors
  1. Masayuki Abe

    You can also search for this author inPubMed Google Scholar

  2. Hideki Imai

    You can also search for this author inPubMed Google Scholar

Editor information

Editors and Affiliations

  1. School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW, 2522, Australia

    Rei Safavi-Naini  & Jennifer Seberry  & 

Rights and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abe, M., Imai, H. (2003). Flaws in Some Robust Optimistic Mix-Nets. In: Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 2003. Lecture Notes in Computer Science, vol 2727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45067-X_4

Download citation

Publish with us

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only


[8]ページ先頭

©2009-2025 Movatter.jp